Assessor Resource

CPPSEC5006A
Determine strategy for the implementation of biometric technology

Assessment tool

Version 1.0
Issue Date: May 2024


This unit of competency has application in those roles involving determining requirements for biometric technology in the workplace to maintain security. Competency requires legal and operational knowledge applicable to relevant sectors of the security industry. The knowledge and skills described in this unit are to be applied within relevant legislative and organisational guidelines.

This unit of competency specifies the outcomes required to determine requirements and processes for the strategic implementation of biometric technology in the workplace.

It requires the ability to determine security and biometric technology requirements, design treatment options and develop an implementation strategy for the integration of a biometrics system.

An understanding of the operating principles of biometric systems including software, hardware and acquisition devices is also required as well as the ability to interpret and apply effective principles and requirements relating to confidentiality, privacy and security in own work.

This unit may form part of the licensing requirements for persons engaged in security operations involving biometric technology in those states and territories where these are regulated activities.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)

Prerequisites

Not Applicable


Employability Skills

This unit contains employability skills.




Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately estimating resources to support implementation strategy and determining roles, responsibilities and work schedules

complying with applicable legislation and codes of ethics applicable to privacy and client confidentiality

complying with organisational policies and procedures, including OHS, relevant to biometric work tasks

designing treatment options which are compatible with assessed risk and security requirements

determining biometric technology requirements based on an accurate evaluation of existing security controls, assets, and potential risks and threats

developing an effective strategy which incorporates the implementation of treatment options, contingency arrangements, and resources for the effective implementation of biometric technology in a workplace environment.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to a registered provider of assessment services

access to a suitable venue and equipment

access to plain English version of relevant statutes and procedures

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

This section describes the skills and knowledge and their level required for this unit.

Required skills

accurately and securely maintain records, reports and other workplace information

analyse organisational security plans, goals, objectives and existing safeguards

coaching and mentoring to provide support to colleagues

comply with applicable confidentiality and privacy requirements

comply with legislation, regulations, standards, codes of practice relevant to workplace biometric technology

conduct and evaluate risk and threat assessments

design effective treatment options

determine biometric technology and system requirements, including single or multiple biometrics applications

determine resources including personnel, tools and equipment

determine security requirements

make effective decisions

plan for contingencies

read and interpret technical information including plans, designs and specifications

relate effectively to people from a range of social, cultural and ethnic backgrounds and varying physical and mental abilities

research and analyse data and specifications

resolve problems

select and use equipment and technology appropriate to the work task

undertake effective enrolment of biometric and biographical data

use appropriate communication and interpersonal skills including negotiation

written communication skills sufficient to complete relevant records and reports.

Required knowledge

accuracy metrics and ratios according to risk tolerance

applicable commonwealth, state or territory legislation, regulations, standards and codes of practice relevant to the full range of processes relating to workplace biometric technology

appropriate mathematical procedures for estimating, measuring and calculating

biometric technology installation and implementation processes, procedures and requirements

ergonomic and safe working practices and procedures

established threshold levels and their impact on security

feasibility and cost-benefit analysis techniques

initial enrolment processes

management of enrolment data

operating systems and integration application requirements

operational principles of information technology

organisational procedures for recording, reporting and maintaining workplace information

organisational security plans, goals and objectives

organisational standards, requirements, policies and procedures for the use of biometric technology

principles of cultural diversity and access and equity

privacy and ethics issues associated with biometric technology

product options for various biometric systems

risk, threats and vulnerabilities associated with biometric technology

security and risk assessment and management techniques and processes

types, functions and parameters of biometric technology including software, hardware and acquisition devices

workplace communication channels, protocols and procedures.

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Occupational Health and Safety (OHS) requirements may relate to:

controlling and minimising risks

correct manual handling including shifting, lifting and carrying

elimination of hazardous materials and substances

identifying hazards

safe use and operation of equipment including

business technology

first aid equipment

fire safety equipment

personal protective clothing and equipment

safety equipment

safety procedures for the protection of self and others.

Legislative requirements may relate to:

Australian standards and quality assurance requirements

award and enterprise agreements

Compliance Policy Guidelines (CPGs)

counter-terrorism

general 'duty of care' responsibilities

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

OHS

relevant industry codes of practice

telecommunications.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

environmental management including waste disposal, recycling and re-use guidelines

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

standard operating procedures

storage and disposal of information

use and maintenance of equipment and systems.

Biometric refers to:

a measurable physical characteristic or personal behavioural trait used to recognise the identity or verify the identity of an individual.

Biometric technologies include:

facial recognition

fingerprint recognition

hand geometry

iris recognition

retina recognition

signature recognition

vein recognition

voice recognition.

Privacy legislation may include:

Commonwealth, State and Territory Privacy Acts

national information privacy principles

national privacy principles.

Security safeguards may be:

administrative and include:

contingency plans (data back-up, disaster recovery, and emergency mode operation plans)

information access management (access authorisation, establishment and modification)

security awareness and training (awareness, virus protection, log-in success or failure, password management)

security incident procedures (report and response procedures)

security management (risk analysis and management)

physical and include measures to protect information systems, buildings and equipment from natural and environmental hazards and unauthorised intrusions

technical and include:

access control (user identification, emergency access procedures, automatic log-off, encryption and decryption)

audit control (logging, capturing data versions, times, sessions, workstations, events and user information)

transmission security (integrity controls, encryption).

Threats:

are intentional or unintentional potential events that could compromise the security integrity of physical and technical organisational systems.

Riskrelates to:

the chance of something happening that will have an impact on objectives.

Risksmay relate to:

data and information

personnel

property.

Communication may be:

face-to-face

group interaction

in Indigenous languages

in languages other than English

oral reporting

participation in routine meetings

reading independently

recording of discussions

speaking clearly and directly

through the use of assistive technology

via an interpreter

visual or written

writing to audience needs.

Interpersonal techniques may involve:

active listening

being non-judgemental

being respectful and non-discriminatory

constructive feedback

control of tone of voice and body language

culturally aware and sensitive use of language and concepts

demonstrating flexibility and willingness to negotiate

effective verbal and non-verbal communication

maintaining professionalism

providing sufficient time for questions and responses

reflection and summarising

two-way interaction

use of plain English

use of positive, confident and cooperative language.

Social and cultural differencesmay relate to:

dress and personal presentation

food

language

religion

social conventions

traditional practices

values and beliefs.

Optionsmay relate to:

enrolment advice

motivation to verify

tolerance for rejected attempts.

Multiplebiometrics refers to:

a biometric system that integrates two ore more biometric technologies (facial and iris recognition, and multiple instances of a single biometric eg one, two or ten fingerprints).

Biometric equipment and systems are:

automated systems able to capture a biometric sample from an individual person, extract biometric data from the sample, compare the data with one or more reference templates, determine the quality of a match, and indicate whether or not an identification or verification of identity has been achieved.

Biometric equipment and systems may include:

acquisition devices:

cameras (video, infrared-enabled video, single-image)

chip or reader embedded in peripheral device

microphones

optical scanners

biometric servers

hardware

interconnecting infrastructure

software:

server-based authentication software for biometric authentication and logging

software associated with acquisition devices.

Resource requirements may include:

computer systems (hardware, software and infrastructure)

equipment

funding

personnel

time

tools.

Existing architecturemay include:

desktop PCs

local area networks (LANs)

mainframe systems

servers

websites

wide area networks (WANs).

Additional requirementsmay relate to:

integration service requirements and interoperability

upgrading or replacing the system or components of the system.

Feasibilitymay relate to:

economic and schedule feasibility

operational feasibility

technical feasibility.

Relevant informationmay include:

assets (resources, data and information)

contingency plans

implementation issues

resource requirements including allocation and location

risk and threat assessment outcomes

treatment options.

Appropriate format may include:

formats that cater for those with special needs for example, producing documents in large print.

Implementation strategy may include:

analysis and comparison of biometrics system options

assessment of security risks

enrolment processes

integration requirement and system interoperability

resources necessary for implementation

staged rollouts.

Contingencies may detail:

roles, responsibilities, teams and procedures associated with restoring a security system following a disruption

side manual door entry.

Relevant personsmay include:

biometric technology specialists

clients

colleagues

external consultants

information technology specialists

manager.

Records and reports:

may be:

computer-based

manual

other appropriate organisational communication system

may detail:

biometric technologies and systems

organisational security requirements

resources requirements

risk assessment outcomes

technical data and specifications

timeframe and financial considerations.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Applicable Occupational Health and Safety (OHS), legislative and organisational requirements relevant to workplace biometric technology are identified and complied with. 
Relevant privacy legislation and codes of ethics relevant to the workplace application of biometric technology are accessed and interpreted. 
Reliability and effectiveness of organisational security safeguards are evaluated. 
Threats to organisational physical and technical security are identified. 
Risks are identified and risk levels established and prioritised. 
Effective communication and interpersonal techniques are used that reflect sensitivity to individual social and cultural differences. 
Specialist assistance to examine and assess security requirements is sought as required in accordance with organisational requirements. 
Legislative and regulatory requirements applicable to the use of biometric technology are confirmed. 
Options for single or multiple biometric technology are determined. 
Physical and technical specifications of biometric equipment and systems to be installed are determined. 
Workspace requirements are identified and locations determined. 
Resources, skills and training requirements for the implementation of biometric technology are determined. 
Existing architecture is assessed for effective integration with biometric technology and additional requirements determined. 
Implementation options are selected in accordance with industry practices and organisational policies and procedures. 
Implementation options are feasible and verifiable in accordance with organisational requirements. 
Implementation options are in compliance with time schedules, available resources and budgetary guidelines. 
Implementation options take into account organisational risk assessment and security requirements. 
Implementation options are effective and applicable in the workplace. 
All relevant information is collated, documented and presented in an appropriate format in accordance with organisational requirements. 
Implementation strategy is developed in accordance with organisational requirements. 
Strategy incorporates contingencies and allows for continuous improvement planning. 
Strategy is presented to relevant persons and feedback is sought and used to evaluate and refine strategy. 
Records and reports are completed and maintained in accordance with legislative and organisational requirements. 

Forms

Assessment Cover Sheet

CPPSEC5006A - Determine strategy for the implementation of biometric technology
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

CPPSEC5006A - Determine strategy for the implementation of biometric technology

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: